After openssh-server-6.6.1p1-31.el7.x86_64 update, the sftp server not recognize group permissions in sftp folders.
Here a portion of the log
Nov 28 17:40:24 server sshd[13642]: remove name "/FilesOut/sftp/test.txt" [postauth]
Nov 28 17:40:24 server sshd[13642]: sent status Permission denied [postauth]
When i do a rollback to the openssh-server-6.6.1p1-25.el7_2 everything works
The openssh-server was installed after a "yum update", SELinux is disabled.
Portion of sshd_config:
Subsystem sftp internal-sftp
# Example of overriding settings on a per-user basis
#Match User anoncvs
# X11Forwarding no
# AllowTcpForwarding no
# PermitTTY no
# ForceCommand cvs server
KerberosAuthentication no
PubkeyAuthentication yes
UsePAM yes
AuthorizedKeysCommand /usr/bin/sss_ssh_authorizedkeys
AuthorizedKeysCommandUser nobody
GSSAPIAuthentication yes
ChallengeResponseAuthentication yes
Match group testpermisosl
ForceCommand internal-sftp -u 0002 -f LOCAL7 -l VERBOSE -m 664
ChrootDirectory /var/test/rtrouter
X11Forwarding no
AllowTcpForwarding no
Permissions on folders
[root@tillbck2 ~]# ls -l /var/test/rtrouter/FilesOut/
total 4
drwxrwxr-x 2 tprouter testpermisosl 4096 Nov 28 17:28 sftp
[root@tillbck2 ~]# id test
uid=1001(test) gid=1002(test) groups=1002(test),1003(testpermisosl)
[root@tillbck2 ~]# stat /var/test/rtrouter/FilesOut/sftp/
File: ‘/var/test/rtrouter/FilesOut/sftp/’
Size: 4096 Blocks: 8 IO Block: 4096 directory
Device: 801h/2049d Inode: 1187844 Links: 2
Access: (0775/drwxrwxr-x) Uid: (571800007/tprouter) Gid: ( 1003/testpermisosl)
Access: 2016-11-28 17:40:20.000000000 +0100
Modify: 2016-11-28 17:28:47.000000000 +0100
Change: 2016-11-28 17:39:24.000000000 +0100
Birth: -